The implementation of AttackAI in Ali Tianchi Security Competition Phase One.
☆30Oct 24, 2019Updated 6 years ago
Alternatives and similar repositories for Attack_Face_Recognition
Users that are interested in Attack_Face_Recognition are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Jul 19, 2018Updated 7 years ago
- The author is lazy, nothing writen.☆29Mar 25, 2023Updated 3 years ago
- ☆43Jul 27, 2021Updated 4 years ago
- ☆43May 21, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 阿里天池AI安全挑战第一期人脸识别攻击☆10Jun 26, 2020Updated 5 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- Steps towards physical adversarial attacks on facial recognition☆83Oct 3, 2023Updated 2 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆415Jul 6, 2021Updated 4 years ago
- ☆10May 14, 2023Updated 2 years ago
- ☆42Mar 11, 2022Updated 4 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Dec 11, 2021Updated 4 years ago
- This repo is for ChaLearn Face Anti-spoofing Attack Detection Challenge@CVPR2019☆10Dec 3, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆42Apr 1, 2024Updated last year
- Tools to make state of the art "face spoofing" attack detector☆16Feb 14, 2022Updated 4 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92May 10, 2023Updated 2 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆337Feb 18, 2021Updated 5 years ago
- Adaface with PartialFC☆28Apr 12, 2024Updated last year
- Automated Security Risk Identification Using AutomationML-based Engineering Data☆31Jul 24, 2022Updated 3 years ago
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆34Dec 5, 2020Updated 5 years ago
- Image-to-Image Translation in PyTorch☆27Jan 23, 2020Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- EfficientNet for Deep Face Recognition☆20Jul 9, 2020Updated 5 years ago
- ☆23May 7, 2024Updated last year
- Target Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning☆10Jul 2, 2019Updated 6 years ago
- ☆11Oct 22, 2017Updated 8 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- Adversarial Generative Network (AGN) implementation in PyTorch☆33Feb 3, 2021Updated 5 years ago
- Implementation of “Localization of Deep Inpainting Using High-Pass Fully Convolutional Network”☆30Apr 13, 2022Updated 3 years ago
- Image Manipulation Detection and Localization☆10Aug 10, 2023Updated 2 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆135May 29, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Redacted code for Rust-based Charge Port Controller☆12Dec 9, 2020Updated 5 years ago
- Transform data from RCSB Protein Data Bank for secondary structure prediction☆12Feb 20, 2019Updated 7 years ago
- Testing the effectiveness of practical implementations of adversarial examples against facial recognition.☆138Feb 18, 2025Updated last year
- ☆17Feb 25, 2019Updated 7 years ago
- ☆13Dec 28, 2023Updated 2 years ago
- The source code for BMVC 2018 paper - Exemplar-Supported Generative Reproduction for Class Incremental Learning☆13Nov 4, 2018Updated 7 years ago
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago